RISK MANAGEMENT SOFTWARE DEPLOYMENT: YOUR GUIDEBOOK TO SUCCESS 17
Clients are also calling for extreme security across all the data that
their RMIS handles. With all the sensitive information RMIS systems
are handling today, they are insisting that it be both encrypted and
sent securely. The setup must also ensure that the data is accessible
to only those users who need it in order to load data into the system.
This focus on security will continue, particularly with emphasis on
requirements like HIPAA. RMIS providers must have the controls in
place to keep the data secure.
SPOTLIGHT ON DATA SECURITY